Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
bbac5c1813c43845344726e549ddb1b8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbac5c1813c43845344726e549ddb1b8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
bbac5c1813c43845344726e549ddb1b8_JaffaCakes118
Size
1.0MB
MD5
bbac5c1813c43845344726e549ddb1b8
SHA1
78cf3f14240e56742a8a9a303d2467092c8971a7
SHA256
85c0b53691d27e2edc76975df9d03a9182c7212f56da8539e3066127cf57b6cf
SHA512
701822490ef2c10374f51021b7813eb940d56a8e07d947e1457d83227e16fb5b02915d5a1a429b8df3a4c7b619e7dca8325121f296dc2d80a4a1e83b8a7ce0cf
SSDEEP
24576:WjReFTImv5FYw/jVzejgbM5HbXGLW5caGk2ICq:iIFTImhFYwbJMRXjjx7
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
d:\tasks\code\tasks\factory\sourcenow\binary\objfre_wlh_amd64\amd64\prevxinstaller.pdb
ExitProcess
GetCommandLineW
CreateFileA
GetFileSize
FindResourceA
SetFilePointer
FreeResource
MoveFileExA
LoadResource
GetTickCount
GetWindowsDirectoryA
WriteFile
GlobalAlloc
SizeofResource
GetFileAttributesA
CreateProcessA
TerminateProcess
WritePrivateProfileStringA
LockResource
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
LocalFree
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
VirtualQuery
GetSystemInfo
GetCommandLineA
GetVersionExW
GetStartupInfoW
GetLastError
HeapFree
HeapAlloc
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
GetStdHandle
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
EncodePointer
DecodePointer
FlsFree
SetLastError
FlsSetValue
FlsGetValue
GetCurrentThreadId
FlsAlloc
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
OutputDebugStringA
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
LoadLibraryW
Sleep
GetCurrentProcess
UnhandledExceptionFilter
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetConsoleCP
GetConsoleMode
VirtualProtect
VirtualAlloc
SetThreadStackGuarantee
MessageBoxA
GetDesktopWindow
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ